Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 15:03

General

  • Target

    26ef9e5b08e4464b71e644ae57362b1a.exe

  • Size

    721KB

  • MD5

    26ef9e5b08e4464b71e644ae57362b1a

  • SHA1

    fc0840cc0dcfcc94f9796619b07d4768e1902b44

  • SHA256

    2bed887fca5ae34bb249eb750e20b7542c9209a169745ad2bd9176618042f8ee

  • SHA512

    e14ffd07270c12a8720bd7db821997fec95f9fb1ee88d72e0a300ddb053a1b1ec90e8c1a28a43d7ba1f3fb2f1492c740aa23afe7a41277e423bcb12a93479c36

  • SSDEEP

    12288:V+J/M+Jhewx/NscEQ+vgXK1HsaP7s4L4Sb8tppC58XMxP+B+T/9BGcgTv2wv9Pnw:a/thewlqB6pm7ITpC52MxP+6/9BWz2ww

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26ef9e5b08e4464b71e644ae57362b1a.exe
    "C:\Users\Admin\AppData\Local\Temp\26ef9e5b08e4464b71e644ae57362b1a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:2244
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2948

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2856-10-0x0000000007F10000-0x0000000007F7A000-memory.dmp

      Filesize

      424KB

    • memory/2856-11-0x0000000008040000-0x00000000080DC000-memory.dmp

      Filesize

      624KB

    • memory/2856-2-0x00000000057F0000-0x0000000005D94000-memory.dmp

      Filesize

      5.6MB

    • memory/2856-3-0x0000000005160000-0x00000000051F2000-memory.dmp

      Filesize

      584KB

    • memory/2856-4-0x0000000005370000-0x0000000005380000-memory.dmp

      Filesize

      64KB

    • memory/2856-5-0x0000000005330000-0x000000000533A000-memory.dmp

      Filesize

      40KB

    • memory/2856-6-0x0000000007D80000-0x0000000007D92000-memory.dmp

      Filesize

      72KB

    • memory/2856-7-0x00000000752D0000-0x0000000075A80000-memory.dmp

      Filesize

      7.7MB

    • memory/2856-8-0x0000000005370000-0x0000000005380000-memory.dmp

      Filesize

      64KB

    • memory/2856-12-0x0000000008000000-0x0000000008032000-memory.dmp

      Filesize

      200KB

    • memory/2856-1-0x00000000752D0000-0x0000000075A80000-memory.dmp

      Filesize

      7.7MB

    • memory/2856-0-0x00000000006E0000-0x000000000079A000-memory.dmp

      Filesize

      744KB

    • memory/2856-9-0x0000000006630000-0x000000000663C000-memory.dmp

      Filesize

      48KB

    • memory/2856-16-0x00000000752D0000-0x0000000075A80000-memory.dmp

      Filesize

      7.7MB

    • memory/2948-15-0x00000000752D0000-0x0000000075A80000-memory.dmp

      Filesize

      7.7MB

    • memory/2948-17-0x0000000005400000-0x0000000005410000-memory.dmp

      Filesize

      64KB

    • memory/2948-13-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2948-18-0x0000000005340000-0x00000000053A6000-memory.dmp

      Filesize

      408KB

    • memory/2948-19-0x0000000006810000-0x0000000006860000-memory.dmp

      Filesize

      320KB

    • memory/2948-20-0x0000000006A30000-0x0000000006BF2000-memory.dmp

      Filesize

      1.8MB

    • memory/2948-21-0x00000000752D0000-0x0000000075A80000-memory.dmp

      Filesize

      7.7MB

    • memory/2948-22-0x0000000005400000-0x0000000005410000-memory.dmp

      Filesize

      64KB